D. Boneh and X. Boyen, Short Signatures Without Random Oracles, pp.56-73, 2004.
DOI : 10.1007/978-3-540-24676-3_4

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-24676-3_4.pdf

D. Boneh, A. Sahai, and B. Waters, Functional encryption, Communications of the ACM, vol.55, issue.11, pp.56-64, 2012.
DOI : 10.1145/2366316.2366333

A. Escala, J. Herranz, and P. Morillo, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, In: AFRICACRYPT. pp, vol.412, issue.12-14, pp.224-241, 2011.
DOI : 10.1007/11426639_7

S. Garg, C. Gentry, S. Halevi, A. Sahai, and B. Waters, Attribute-Based Encryption for Circuits from Multilinear Maps, pp.479-499, 2013.
DOI : 10.1007/978-3-642-40084-1_27

URL : http://eprint.iacr.org/2012/592.pdf

J. Herranz, F. Laguillaumie, B. Libert, and C. , Short Attribute-Based Signatures for Threshold Predicates, CT-RSA'12, pp.51-67, 2012.
DOI : 10.1007/11426639_7

URL : https://hal.archives-ouvertes.fr/hal-00611651

S. Hohenberger and B. Waters, Online/Offline Attribute-Based Encryption, pp.293-310, 2014.
DOI : 10.1007/978-3-642-54631-0_17

URL : https://eprint.iacr.org/2014/021.pdf

J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, Attribute-based signature and its applications, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.60-69, 2010.
DOI : 10.1145/1755688.1755697

H. K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-Based Signatures, pp.376-392, 2011.
DOI : 10.1007/11426639_7

T. Okamoto and K. Takashima, Efficient attribute-based signatures for non-monotone predicates in the standard model, pp.35-52, 2011.

T. Okamoto and K. Takashima, Decentralized Attribute-Based Signatures, pp.125-142, 2013.
DOI : 10.1007/978-3-642-36362-7_9

URL : http://eprint.iacr.org/2011/701.pdf

Y. Rouselakis and B. Waters, Practical constructions and new proof methods for large universe attribute-based encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.463-474, 2013.
DOI : 10.1145/2508859.2516672

S. F. Shahandashti and R. Safavi-naini, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, In: AFRICACRYPT. pp, vol.18, issue.1, pp.198-216, 2009.
DOI : 10.1007/11426639_7

URL : http://eprint.iacr.org/2009/126.pdf

S. R. Tate and R. Vishwanathan, Expiration and revocation of keys for attributebased signatures, Cryptology ePrint Archive Report, vol.2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01745835

B. Waters, Functional Encryption: Origins and Recent Developments, pp.51-54, 2013.
DOI : 10.1007/978-3-642-36362-7_4

S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, pp.275-292, 2014.
DOI : 10.1007/978-3-642-54631-0_16